Executive Guide to Computer Viruses
Title | Executive Guide to Computer Viruses PDF eBook |
Author | Charles Ritstein |
Publisher | DIANE Publishing |
Pages | 85 |
Release | 1993 |
Genre | Computer networks |
ISBN | 1568062516 |
Designed for the busy executive. Provides a clear understanding of viruses and the detrimental effect they could have on an organization. Includes step-by-step methods to disinfect your computer.
Viruses Revealed
Title | Viruses Revealed PDF eBook |
Author | David Harley |
Publisher | McGraw Hill Professional |
Pages | 722 |
Release | 2002-12-06 |
Genre | Computers |
ISBN | 0072228180 |
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Defend your system against the real threat of computer viruses with help from this comprehensive resource. Up-do-date and informative, this book presents a full-scale analysis on computer virus protection. Through use of case studies depicting actual virus infestations, this guide provides both the technical knowledge and practical solutions necessary to guard against the increasing threat of virus attacks.
Guide to Computer Viruses
Title | Guide to Computer Viruses PDF eBook |
Author | Robert Slade |
Publisher | Springer |
Pages | 433 |
Release | 2012-12-06 |
Genre | Computers |
ISBN | 1461223849 |
For those who didn't buy the first edition, welcome aboard. For those who did buy the first edition, welcome back, and thanks for making the second edition possible. For those who bought the first edition and are standing in the book store wondering whether to buy the second, what's in it for you? Well, for one thing, it's smaller. (No, no! Don't leave!) I tried to make the first edition a kind of master reference for antiviral protection. That meant I included a lot of stuff that I thought might possibly be helpful, even if I had some doubts about it. This time I've tried to be a little more selective. I've added a little more material to Chapter 4 (Computer Opera tions and Viral Operations) dealing with the question of computer vi ruses infecting data files and the new "macro" viruses. I've added two new sections to Chapter 7 (The Virus and Society). One looks at the increasing problem of false alarms while the other looks at the ethics of virus writing and exchange.
An Executive's Guide to Information Technology
Title | An Executive's Guide to Information Technology PDF eBook |
Author | Robert Plant |
Publisher | Cambridge University Press |
Pages | 363 |
Release | 2007-05-17 |
Genre | Technology & Engineering |
ISBN | 1139463934 |
Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This 2007 book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more than a dictionary - it is a concise review of the most important aspects of information technology from a business perspective: the major advantages, disadvantages and business value propositions of each term are discussed, as well as sources for further reading, and cross-referencing with other terms where applicable. The essential elements of each concept are covered in a succinct manner so the reader can quickly obtain the required knowledge without wading through exhaustive descriptions. With over 200 terms, this is a valuable reference for non- and semi-technical managers, executives and graduate students in business and technology management.
A Pathology of Computer Viruses
Title | A Pathology of Computer Viruses PDF eBook |
Author | David Ferbrache |
Publisher | Springer Science & Business Media |
Pages | 299 |
Release | 2012-12-06 |
Genre | Computers |
ISBN | 1447117743 |
The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.
Biometric Security and Privacy
Title | Biometric Security and Privacy PDF eBook |
Author | Richard Jiang |
Publisher | Springer |
Pages | 423 |
Release | 2016-12-21 |
Genre | Technology & Engineering |
ISBN | 3319473018 |
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.
Network World
Title | Network World PDF eBook |
Author | |
Publisher | |
Pages | 44 |
Release | 1992-02-17 |
Genre | |
ISBN |
For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations. Readers are responsible for designing, implementing and managing the voice, data and video systems their companies use to support everything from business critical applications to employee collaboration and electronic commerce.